The Goldilocks principle for zero trust fraud prevention

According to Wikipedia, “zero trust is an information security framework which states that organizations should not trust any entity inside or outside of their perimeter at any time.” In the Identity and Access Management (IAM) world, zero trust is all… Continue reading The Goldilocks principle for zero trust fraud prevention

Nearly half of consumers worry about being tricked by fraudsters this holiday season

There has been a 29% increase in suspected online retail fraud during the start of the 2019 holiday shopping season compared to the same period in 2018, and a 60% increase in suspected e-commerce fraud during the same period from 2017 to 2019, accordin… Continue reading Nearly half of consumers worry about being tricked by fraudsters this holiday season

The FBI multi-factor authentication notification that should have never been

While reviewing the recent Private Industry Notification from the FBI about using social engineering and technical attacks to circumvent multi-factor authentication, I was floored at how each of these account takeover scenarios seemed completely preven… Continue reading The FBI multi-factor authentication notification that should have never been

Risky transactions on mobile devices increase 138% since 2017

Risky transactions on mobile devices are showing an increase of 138% since 2017, iovation survey of 802 consumers from the United Kingdom and 802 consumers from the United States reveals. “Our research determined three key market drivers that will shap… Continue reading Risky transactions on mobile devices increase 138% since 2017

Tackling biometric breaches, the decentralized dilemma

A recent discovery by vpnMentor revealed a worst case scenario for biometrics: a large cache of biometric data being exposed to the rest of the world. In this case web-based biometric security smart lock platform, BioStar 2, was breached. This breach s… Continue reading Tackling biometric breaches, the decentralized dilemma

49% of all risky online transactions come from mobile devices

About half of all risky online transactions appear to be coming from a mobile device, according to iovation. Specifically, in the first half of 2019 49% of all risky transactions came from mobile devices, up from 30% in 2018, 33% in 2017 and 25% in 201… Continue reading 49% of all risky online transactions come from mobile devices

Risky mobile transactions are up 19% this year as patch providers race to keep up

It’s hardly news that scammers are taking money in various ways from unsuspecting smartphone users, but a new analysis of 30 billion online transactions shows that the fraudsters are adapting and innovating in ways that much of the public doesn’t understand. One number tells the story: Iovation, a fraud detection firm acquired in 2018 by TransUnion, flags risky transactions worldwide and then looks more closely at how they happened. In recent years, about one-third of all flagged transactions involved mobile devices. In the first half of 2019, that number jumped to 49%, according to findings released Tuesday. Iovation defines “risky” based on the number of transactions in a given period of time from a device, geolocation anomalies, potential bot activity and other actions that typically result in fraud. The findings only provide the latest evidence that mobile devices, which will be the primary way most of the world will access the internet within a few years, are […]

The post Risky mobile transactions are up 19% this year as patch providers race to keep up appeared first on CyberScoop.

Continue reading Risky mobile transactions are up 19% this year as patch providers race to keep up

Avoiding a biometric dystopia

In part one of our two-part series, we explored how biometric authentication methods are being defeated. In the second part, we’ll explore how manipulating biometrics can alter society, and what can be done to avoid a biometric dystopia. Biometric auth… Continue reading Avoiding a biometric dystopia

Beating biometrics: Why biometric authentication alone is not a panacea

As we witness the accelerating use of biometrics throughout our lives, we must pause to consider the risks and ramifications of doing so as technological advancements make it increasingly easy to mimic, manipulate and manufacture biometry. As the world… Continue reading Beating biometrics: Why biometric authentication alone is not a panacea